Poland Reports 150% Surge in Cyberattacks, Cites Unprecedented Assault on Energy Grid

Poland Faced a Surge in Cyberattacks in 2025, Including a Major Assault on the Energy Sector

HIGH
March 24, 2026
6m read
CyberattackIndustrial Control SystemsThreat Intelligence

Related Entities

Organizations

CERT Polska

Full Report

Executive Summary

Poland is facing a rapidly escalating cyber threat, with the Deputy Minister of Digital Affairs, Paweł Olszewski, reporting a 150% increase in cyberattacks in 2025 compared to the previous year. This amounted to 270,000 documented incidents. The most alarming of these was an unprecedented, coordinated cyberattack in December 2025 against the nation's energy infrastructure. The attack targeted a combined heat and power (CHP) plant serving nearly 500,000 customers, as well as multiple wind and solar farms. While the attack was ultimately thwarted before it could disrupt the electricity supply, Polish authorities, including CERT Polska, have labeled it a "significant escalation." The government believes the attack was carried out by a single, sophisticated threat actor, with strong suspicion falling on groups linked to Russian intelligence services, highlighting the growing threat of state-sponsored attacks on critical infrastructure in NATO countries.


Threat Overview

Attack Type: Coordinated Cyberattack on Critical Infrastructure (ICS/OT) Target: Polish energy sector, including a CHP plant and renewable energy farms. Timeline: December 2025 Attribution: Suspected Russian state-sponsored actor Impact: Attempted sabotage and disruption of energy supply.

The attack is significant not just for its scale, but for its coordinated nature, targeting multiple components of the energy grid simultaneously. This suggests a well-resourced and highly capable adversary with deep knowledge of Industrial Control Systems (ICS) and Operational Technology (OT) environments. The Polish government's decision to publicly release a technical report on the attack is a rare move, indicating the severity of the threat and a desire to enlist the global cybersecurity community's help in analyzing and defending against this new level of aggression.

Technical Analysis

While the specific technical details from the government report are not fully detailed in the news, attacks on energy infrastructure often involve these TTPs:

  1. Initial Access: Gaining access to the corporate IT network is often the first step. This can be achieved via phishing (T1566 - Phishing) or exploiting vulnerabilities in internet-facing systems. (T1190 - Exploit Public-Facing Application).
  2. Pivoting from IT to OT: The critical step is crossing the air gap or traversing the firewalls between the enterprise IT network and the sensitive OT network that controls physical processes. (T0886 - Remote Services).
  3. ICS Reconnaissance: Once in the OT network, attackers use specialized protocols like Modbus or DNP3 to discover and map out the control systems, including PLCs, HMIs, and engineering workstations. (T0829 - Network Sniffing).
  4. Manipulation of Control: The ultimate goal is to send malicious commands to the control systems to disrupt physical processes. This could involve opening circuit breakers, changing turbine speeds, or disabling safety systems, which could lead to blackouts or physical damage. (T0831 - Manipulation of View, T0832 - Manipulation of Control).

The coordinated nature of the attack across a CHP plant and renewable farms suggests the attacker had broad access and was attempting to cause a widespread, systemic failure.

Impact Assessment

  • National Security Threat: A successful attack could have caused a widespread blackout in Poland, impacting hundreds of thousands of citizens, crippling other critical infrastructure, and posing a direct threat to national security.
  • Geopolitical Escalation: As a direct attack on a NATO member's critical infrastructure, likely by a Russian state actor, this incident represents a significant geopolitical escalation in cyberspace, just below the threshold of armed conflict.
  • Economic Disruption: A major power outage would cause massive economic disruption, halting manufacturing, commerce, and daily life.
  • Physical Damage: Manipulation of heavy industrial equipment in a power plant can cause permanent physical damage that is expensive and time-consuming to repair.

Detection & Response for ICS/OT

  1. Network Monitoring at the IT/OT Boundary: All traffic passing between the IT and OT networks must be inspected. Any unauthorized protocol or connection attempt should trigger an immediate alert.
  2. OT Anomaly Detection: Deploy specialized OT security monitoring solutions that understand ICS protocols. These tools can baseline normal operations and detect anomalous commands, such as a PLC being reprogrammed from an unauthorized workstation.
  3. Honeypots: Deploying OT honeypots can lure attackers into a monitored environment, revealing their TTPs without risking the live production network.

Mitigation for ICS/OT

  1. Robust IT/OT Segmentation: Enforce a strict, well-defined boundary between the IT and OT networks using a DMZ and unidirectional gateways where possible. There should be no direct path from the internet to the OT network.
  2. OT-Specific Incident Response Plan: Have a dedicated IR plan for OT environments that includes engineers and plant operators. The plan must have procedures for safely disconnecting systems or switching to manual control without endangering personnel or equipment.
  3. Asset Inventory and Vulnerability Management: Maintain a complete inventory of all OT assets and manage vulnerabilities, even though patching in OT is more complex than in IT.
  4. Physical Security: Ensure strong physical security controls for all facilities housing critical control systems.

Timeline of Events

1
December 1, 2025
A coordinated cyberattack targets Poland's energy infrastructure.
2
March 24, 2026
This article was published

MITRE ATT&CK Mitigations

Strict segmentation between IT and OT networks is the most critical defense for preventing attackers from pivoting to control systems.

Use application allowlisting on critical OT systems like HMIs and engineering workstations to prevent unauthorized code execution.

Monitor and filter all traffic crossing the IT/OT boundary, allowing only expected protocols and connections.

Develop and test an OT-specific incident response plan that includes steps for safe shutdown and manual operation.

D3FEND Defensive Countermeasures

The most fundamental defense against an attack like the one on Poland's energy grid is robust network isolation and segmentation, specifically between the Information Technology (IT) and Operational Technology (OT) networks. This should be implemented using the Purdue Model as a guide. A properly configured Industrial DMZ (IDMZ) should sit between the IT and OT environments, with strict firewall rules that deny all traffic by default. All connections initiated from the IT network into the OT network should be prohibited. Data should be passed through application-layer proxies in the IDMZ. This architecture prevents an attacker who compromises the corporate IT network from being able to directly scan, access, or attack the sensitive PLCs and control systems in the OT environment, effectively containing the threat to the less critical network.

To detect malicious activity within the OT network itself, energy operators must deploy specialized OT-aware Network Traffic Analysis. Unlike IT tools, these solutions understand industrial protocols (e.g., Modbus, DNP3, IEC 61850). They passively monitor network traffic to baseline normal operations—what PLCs talk to which HMIs, what commands are normal, etc. The system would then generate a high-priority alert for any anomalous activity, such as: an engineering workstation in one plant attempting to communicate with a PLC in another, a PLC receiving a 'stop' command outside of a scheduled maintenance window, or the appearance of non-industrial traffic like SMB or RDP within the control network. This provides visibility into malicious actions before they can cause a physical impact.

Given the potential for physical consequences, a standard IT incident response plan is insufficient. Energy operators need a specific, well-rehearsed OT Incident Response Plan. This plan must be developed jointly by cybersecurity staff, control engineers, and plant operators. It must include clear criteria for when to enact a safe, emergency shutdown of physical processes. The plan should outline procedures for failing over to manual control and isolating compromised network segments without jeopardizing safety. Contact lists must include not only the CISO and IT team but also plant managers and on-site engineers. Regular tabletop exercises that simulate scenarios like the Poland attack are essential to ensure that all stakeholders know their roles and can act decisively under pressure to protect both the grid and human life.

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

PolandRussiaCyberattackEnergy SectorICSOTCritical InfrastructureNATO

📢 Share This Article

Help others stay informed about cybersecurity threats